Maritime Security Final Exam Questions
and Answers
Identify iipossible iithreats iiand iivulnerabilities
Establish iiand iiprioritize iisecurity iimeasures
Ensuring iisecurity iitraining iiand iiawareness ii- iiAnswers ii-Duties iiof iiCSO ii& iiVSO
The iicompany iisecurity iiofficer iiis iithe iifoundation iiof iithe iiprogram.
Responsibilities iiInclude:
Conduct iivessel iisecurity iiassessment
Implementing iisecurity iiplan
Open-source iiinformation
Ships iiagent
Government iiInformation
PFSO
Local iiLaw iiEnforcement ii- iiAnswers ii-Sources iiof iiInformation
Where iido iiwe iiget iiit?
Personnel/Private
Virus
Man iiin iithe iiMiddle
Worms
Phishing
Crypto iijacking
SQL ii- iiAnswers ii-Maritime iiSecurity
Viruses iiand iithreats iito iithe iiMTS iiNetwork ii(only ii5)
Port iiOperations
Cargo iiOperations
Vessel iiOperations
Vessel iiManagement
Vessel iiTraffic iiServices ii- iiAnswers ii-MTS iicomputer iiand iicyber iioperations iithat iicould
iibe iiinter-connected:
Manufacturing
files
charts
environmental ii
financial ii
, life ii- iiAnswers ii-Maritime iiCyber iiSecurity
ECDIS iiflows iimight iiallow iian iiattacker iito iiaccess iiand iimodify() iiand ii() iion iiboard iior
iion iishore; iiwhich iicould iicause iiserious ii() iiand ii() iidamage, iieven iiloss iiof ii().
smuggled iidrugs
deleted iithe iirecords
release iicontainers ii- iiAnswers ii-Maritime iiCyber iiSecurity
Case iistudy iiof iiPort iiof iiAntwerp, iiBelgium
2011-2013: iiHackers iiinfiltrated iicomputers iiconnected iito iithe iiport, iimade iioff iiwith iitheir
ii() iiand ii().
Attackers iiobtained iiremote iiaccess iito iithe iiterminal iisystems; ii() iito iitheir iiown iitrucks
iiwithout iithe iiknowledge iiof iithe iiport iiof iithe iishipping iiline.
rate
cargo ii#
operations
wrong iidestination
finance ii- iiAnswers ii-The iiIran iiShipping iiLine
The iiattacks iidamaged iiall iithe iidate iirelated iito ii() iito iiloading ii() iidate iiand iiplace
Even iithough iithe iidata iiwas iieventually iirecovered. iiIt iilead iito iisignificant iidisruptions ii()
iiand iiresulted iiin iisending iicargo iito iithe ii() iicausing iisever ii() iilosses.
overwhelming iia iiwebsite iiwith iiso iimany iirequest, iiit iiis iioverloaded iiand iithe iisystem
iishuts iidown, iiunable iito iiserve iianyone ii- iiAnswers ii-What iiis iia iiDOS iiattack
An iiattacker iiinterposes iithemselves iisecrelty iibetween iia iiweb iiservice iiand iian
iiindivgual iito iigain iiaccess iito iiinformation iithe iiindividual iisends. ii- iiAnswers ii-Man iiin
iithe iimiddle iicyber iiattack
Modification iiof iiall iiship's iidetails, iiposition, iicourse, iicargo, iispeed, iiand iiname.
Trigger iia iifalse iicollision iiwarning iialert, iiresulting iiin iia iicourse iiadjustment. ii- iiAnswers
ii-Write iitwo iiplausible iicyber-attack iiscenarios iiinto iiAIS
Creating iia iiway iito iicheck iiAIS iimessages iifor iitampering
Making iiit iiimpossible iito iienact iireplay iiattacks iiby iiadding iitime iichecking. ii- iiAnswers ii-
Write iitwo iiprotentional iicountermeasures iito iiAIS iivulnerability.
Casual ii
Sighting ii
Agitated ii- iiAnswers ii-Types iiof iiCrowds
Observation
Channeling
Diversion
Cooperation
Show iiof iiForce ii- iiAnswers ii-Crowd iicontrol iitechniques
and Answers
Identify iipossible iithreats iiand iivulnerabilities
Establish iiand iiprioritize iisecurity iimeasures
Ensuring iisecurity iitraining iiand iiawareness ii- iiAnswers ii-Duties iiof iiCSO ii& iiVSO
The iicompany iisecurity iiofficer iiis iithe iifoundation iiof iithe iiprogram.
Responsibilities iiInclude:
Conduct iivessel iisecurity iiassessment
Implementing iisecurity iiplan
Open-source iiinformation
Ships iiagent
Government iiInformation
PFSO
Local iiLaw iiEnforcement ii- iiAnswers ii-Sources iiof iiInformation
Where iido iiwe iiget iiit?
Personnel/Private
Virus
Man iiin iithe iiMiddle
Worms
Phishing
Crypto iijacking
SQL ii- iiAnswers ii-Maritime iiSecurity
Viruses iiand iithreats iito iithe iiMTS iiNetwork ii(only ii5)
Port iiOperations
Cargo iiOperations
Vessel iiOperations
Vessel iiManagement
Vessel iiTraffic iiServices ii- iiAnswers ii-MTS iicomputer iiand iicyber iioperations iithat iicould
iibe iiinter-connected:
Manufacturing
files
charts
environmental ii
financial ii
, life ii- iiAnswers ii-Maritime iiCyber iiSecurity
ECDIS iiflows iimight iiallow iian iiattacker iito iiaccess iiand iimodify() iiand ii() iion iiboard iior
iion iishore; iiwhich iicould iicause iiserious ii() iiand ii() iidamage, iieven iiloss iiof ii().
smuggled iidrugs
deleted iithe iirecords
release iicontainers ii- iiAnswers ii-Maritime iiCyber iiSecurity
Case iistudy iiof iiPort iiof iiAntwerp, iiBelgium
2011-2013: iiHackers iiinfiltrated iicomputers iiconnected iito iithe iiport, iimade iioff iiwith iitheir
ii() iiand ii().
Attackers iiobtained iiremote iiaccess iito iithe iiterminal iisystems; ii() iito iitheir iiown iitrucks
iiwithout iithe iiknowledge iiof iithe iiport iiof iithe iishipping iiline.
rate
cargo ii#
operations
wrong iidestination
finance ii- iiAnswers ii-The iiIran iiShipping iiLine
The iiattacks iidamaged iiall iithe iidate iirelated iito ii() iito iiloading ii() iidate iiand iiplace
Even iithough iithe iidata iiwas iieventually iirecovered. iiIt iilead iito iisignificant iidisruptions ii()
iiand iiresulted iiin iisending iicargo iito iithe ii() iicausing iisever ii() iilosses.
overwhelming iia iiwebsite iiwith iiso iimany iirequest, iiit iiis iioverloaded iiand iithe iisystem
iishuts iidown, iiunable iito iiserve iianyone ii- iiAnswers ii-What iiis iia iiDOS iiattack
An iiattacker iiinterposes iithemselves iisecrelty iibetween iia iiweb iiservice iiand iian
iiindivgual iito iigain iiaccess iito iiinformation iithe iiindividual iisends. ii- iiAnswers ii-Man iiin
iithe iimiddle iicyber iiattack
Modification iiof iiall iiship's iidetails, iiposition, iicourse, iicargo, iispeed, iiand iiname.
Trigger iia iifalse iicollision iiwarning iialert, iiresulting iiin iia iicourse iiadjustment. ii- iiAnswers
ii-Write iitwo iiplausible iicyber-attack iiscenarios iiinto iiAIS
Creating iia iiway iito iicheck iiAIS iimessages iifor iitampering
Making iiit iiimpossible iito iienact iireplay iiattacks iiby iiadding iitime iichecking. ii- iiAnswers ii-
Write iitwo iiprotentional iicountermeasures iito iiAIS iivulnerability.
Casual ii
Sighting ii
Agitated ii- iiAnswers ii-Types iiof iiCrowds
Observation
Channeling
Diversion
Cooperation
Show iiof iiForce ii- iiAnswers ii-Crowd iicontrol iitechniques